Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Hi-index | 0.00 |
SoC is one of the important components of social and personal information systems, which directly influence with our life, property and privacy. Security technology is now embedded into various hardware and software of SoC and SoC designers should be concerned with security issues. Cryptography requires heavy computation and wireless communication requests architecture and protocols for security. In design process of SoC, choice of IP's and design data control also significantly affect on the security of the systems that uses the SoC. In this panel, we will have discussions on the security on SoC from various viewpoints. System architecture, circuit complexity, test and validation, energy consumption, security policy, and design methodology are discussed for exploring research directions of secure systesynthesis.